• Aucun résultat trouvé

Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies

N/A
N/A
Protected

Academic year: 2021

Partager "Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies"

Copied!
5
0
0

Texte intégral

Loading

Figure

Figure 1: Our evaluation methodology
Figure 3: Sample of the elicitation tool
Table 2: Sample of the evaluation results

Références

Documents relatifs

Enforcement rescripts (type 3) are mere variants of this scheme: either the decision previously sent by the catholicos has not been implemented yet and Ḥenanishoʿ commands its

Quantification of BC migration defects in stage 10 dapc or dapc1 mutant MARCM mosaic egg chambers in which b-catenin/Arm levels are either lowered in the mutant cells by the use

The other, called ArgueSecure, is a collaborative, browser-based version which allows for distributed risk analysis and security requirements elicitation sessions.. While the

Dan Slu ú anschi a tenu à garder la forme des noms propres homériques dans une forme la plus proche possible de l’original grec, en se situant sur ce point à l’opposé de Murnu

Beckers, K., Faßbender, S., Heisel, M., K¨ uster, J.C., Schmidt, H.: Supporting the development and documentation of ISO 27001 information security management systems through

We are currently working on SecCo, which will be the socio-technical security mod- elling language for the EU-funded Aniketos project. Aniketos is about ensuring trust- worthiness

SecBPMN [5] (Secure BPMN) is a modeling language, based on Business Process Modelling and Notation (BPMN), which allows analysts to (i) model business pro- cesses with

Like diagnostic security information and knowledge, prescriptive aspects should be assignable to each security topic as easily and intuitively as possible, and